• 제목/요약/키워드: Supervisory control and data acquisition

검색결과 117건 처리시간 0.024초

원격 감시 제어시스템에서 키 관리 방안 연구 (Research on key management for supervisory control and data acquisition system)

  • 이건직
    • 디지털산업정보학회논문지
    • /
    • 제16권4호
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

아파트 단지의 전력감시반 개선 연구 (A Study on the Improvement of Electric Supervisory in Apartment Complex)

  • 홍규장;김채규
    • 한국조명전기설비학회:학술대회논문집
    • /
    • 한국조명전기설비학회 1993년도 추계학술발표회논문집
    • /
    • pp.51-54
    • /
    • 1993
  • In this paper, it is proposed the the SCADA(Supervisory control and Data Acquisition) system in Apartment complex. The proposed SCADA system make use of the computer CRT(Cathod RAy Tube), which automatically observe the Electrical Facility, Elvator Facility, Fire Alarm Facility and process in the real-time data. In order to improve the hardware performance and the information process, the SCADA system composed of master-slave topology and decentralized the supervisory Facility. This system is expected the retrenchment of construction expenditure and the level-up of supervisory execution.

  • PDF

긴급제언 - 원격감시제어시스템의(SCADA) 기술현황과 도시가스산업에서의 발전방안 (The Current technology state of "Supervisory Control And Data Acquisition System(SCADA)" and development plan in the city-gas industry)

  • 최인환
    • 기술사
    • /
    • 제43권3호
    • /
    • pp.28-33
    • /
    • 2010
  • The related industrial technologies are also being developed in medicine, education, the military, transportation, process management, security management and information technology industries due to a rapid progress in telecommunications technology. The supervisory remote control system is based upon telecommunications technology. The supervisory remote control systems are used in various ways such as city gas, water supply and drainage, environment, power, communication and device control fields. The supervisory remort control system became a solution with complex systems and important technologies in electricity, city gas filed that require safety management skills. The supervisory remote control system as a special technology has a lot of practical applications. In this paper, Let me examine the present status of remort control system applications and present development plans and alternatives in city-gas industrial technology.

  • PDF

Wide-Area SCADA System with Distributed Security Framework

  • Zhang, Yang;Chen, Jun-Liang
    • Journal of Communications and Networks
    • /
    • 제14권6호
    • /
    • pp.597-605
    • /
    • 2012
  • With the smart grid coming near, wide-area supervisory control and data acquisition (SCADA) becomes more and more important. However, traditional SCADA systems are not suitable for the openness and distribution requirements of smart grid. Distributed SCADA services should be openly composable and secure. Event-driven methodology makes service collaborations more real-time and flexible because of the space, time and control decoupling of event producer and consumer, which gives us an appropriate foundation. Our SCADA services are constructed and integrated based on distributed events in this paper. Unfortunately, an event-driven SCADA service does not know who consumes its events, and consumers do not know who produces the events either. In this environment, a SCADA service cannot directly control access because of anonymous and multicast interactions. In this paper, a distributed security framework is proposed to protect not only service operations but also data contents in smart grid environments. Finally, a security implementation scheme is given for SCADA services.

Sensors Network and Security and Multimedia Enhancement

  • Woo, Seon-mi;Lee, Malrey
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권1호
    • /
    • pp.64-68
    • /
    • 2016
  • These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systems (DCSs) are widely deployed in all over the world, which are designed to control the industrial infrastructures, in real ways. To supervise and control the various parts of designed systems; trends to require a deep knowledge to understand the overall functional needs of industries, which could be a big challenge. Industrial field devices (or network sensors) are usually distributed in many locations and are controlled from centralized site (or main control center); the communication provides various signs of security issues. To handle these issues, the research contribution will twofold: a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site. At controller site, multimedia components are employed to control the overall transmission graphically, such as system communication, bytes flows, security embedded parameters and others, by the means of multimedia technology.

상태추정을 이용한 고 신뢰도 측정데이터 확보방안 연구 (Preparation of Reliable Measurement Data by Using State Estimation)

  • 김홍래
    • 한국산학기술학회논문지
    • /
    • 제8권5호
    • /
    • pp.1020-1025
    • /
    • 2007
  • 전력시스템을 안정적이고 경제적으로 운영하기 위하여 EMS(energy management system)와 SCADA(supervisory control and data acquisition) 시스템이 사용되고 있다. EMS 내의 조류계산, 상정고장해석, 안전도해석과 같은 다양한 기능들의 신뢰성을 높이기 위해서는 정확한 데이터의 확보가 필수적이다. EMS 내에서 상태추정이 이와 같은 역할을 수행할 수 있으며, 본 논문에서는 정확한 상태추정을 위한 가관측성 해석 및 불량데이터 처리 프로그램을 개발하였다. 기본적인 알고리즘을 설명하고 사례연구를 통해 제안된 기법의 타당성을 검증하였다.

  • PDF

PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석 (A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks)

  • 박동국
    • 디지털산업정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

Improving a Forward & Backward Secure Key Management Scheme for Wireless Sensor Networks

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • 제7권4호
    • /
    • pp.521-524
    • /
    • 2009
  • Park proposed a forward & backward Secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems [7]. The scheme, however, is still vulnerable to an attack called "sandwich attack": two nodes captured at times $t_1$ and $t_2$, respectively, surrenders all the group keys used between times $t_1$ and $t_2$. In this paper, we propose a fix to the scheme, which can limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched.

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.